Hack in real environments and receive rewards.
We have the best of all platforms in one.
We will give you a certificate that includes all the vulnerabilities you have found to include in your resume.
Receive money for each vulnerability you find in bug bounty programs.
Test your knowledge in real environments in a legal way.
You will be helping to improve the cybersecurity of Spanish startups, NGOs, foundations and open source projects that most need it.
We are very focused on training, here you can learn from the best hackers in Spanish.
In this session, we will explore how to interpret and strategically leverage scope limitations in bug bounty programs. We will also examine real-world cases, errors in scope definition, and ways to think outside the box without violating the rules.
In this session, we will explore Client-Side Path Traversals, a category of vulnerability that is often underestimated in bug bounty and web pentesting. We will look at real-world examples of exploitation and analyze strategies for effectively identifying and reporting them.
By: Jorge Cerezo
Alexis is Red Team Manager at Visma with over 10 years of experience in ethical hacking, security, and server administration. He is a certified offensive security professional and certified network security specialist.
In this session, we will explore tools and strategies for exploiting vulnerabilities in APIs. We will analyze why APIs have become the main target of cybercriminals, what the OWASP Top 10 API Security Risks are, and more.